Fake Extension Fiasco: $500,000 Crypto Heist Highlights the Dangers of Malicious IDE Plugins
Cursor AI IDE’s fake extension, posing as a helpful tool, swindled a Russian crypto developer out of $500,000. It sneakily installed the ScreenConnect tool, granting full control to cybercriminals. Kaspersky advises developers to double-check extensions, as even an innocent download can lead to a wallet-draining adventure.

Hot Take:
Turns out, even your cursor can be a little too eager to help itself… to your cryptocurrency! Forget about the dog eating your homework, now the mouse is eating your crypto. It’s a lesson in why you should never let a fake extension get too attached to your computer, lest it become your new unwanted roommate.
Key Points:
- A malicious extension posing as a Solidity language tool targeted the Cursor AI IDE code editor.
- The fake tool led to the theft of $500,000 in cryptocurrency from a Russian developer.
- It used a PowerShell script to install remote access tools and infostealers on victim devices.
- The bogus extension amassed 54,000 downloads before removal, with a successor reaching nearly two million.
- Kaspersky warns of the dangers of downloading from open repositories due to malware risks.
Already a member? Log in here